CN115396327B - System access switching method and device - Google Patents

System access switching method and device Download PDF

Info

Publication number
CN115396327B
CN115396327B CN202211109709.6A CN202211109709A CN115396327B CN 115396327 B CN115396327 B CN 115396327B CN 202211109709 A CN202211109709 A CN 202211109709A CN 115396327 B CN115396327 B CN 115396327B
Authority
CN
China
Prior art keywords
disaster recovery
exercise
drilling
time period
plan document
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211109709.6A
Other languages
Chinese (zh)
Other versions
CN115396327A (en
Inventor
周侃
耿鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202211109709.6A priority Critical patent/CN115396327B/en
Publication of CN115396327A publication Critical patent/CN115396327A/en
Application granted granted Critical
Publication of CN115396327B publication Critical patent/CN115396327B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0668Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Hardware Redundancy (AREA)

Abstract

The application provides a system access switching method and device, and relates to the technical field of data access. The system access switching method comprises the following steps: receiving a plurality of disaster recovery drilling plan documents from a first terminal, and updating the drilling time period of one disaster recovery drilling plan document when the drilling time periods of any two disaster recovery drilling plan documents are detected to be overlapped and the identification of a system to be drilled of one disaster recovery drilling plan document is the identification of a system mutually exclusive to the identification of the system to be drilled in the other disaster recovery drilling plan document, so that the drilling time periods of the two disaster recovery drilling plan documents are not overlapped; when the current moment reaches any drilling time period, the access address of the system to be drilled in the corresponding disaster recovery drilling plan document is switched from the first access address to the second access address, so that the second terminal accesses the system to be drilled through the second access address, and data loss or system faults are avoided.

Description

System access switching method and device
Technical Field
The present application relates to the field of data access technologies, and in particular, to a system access switching method and device.
Background
Disaster recovery switching means that two or more sets of systems with the same function are built at different places far apart, and when one system stops working due to accidents (such as fire, earthquake, server fault, hard disk damage and the like), the whole system can be switched to the other place, so that the functions of the system can continue to work normally.
Generally, some enterprises (such as banks and fund companies) perform disaster recovery switching exercises in order to perform disaster recovery switching normally when unexpected occurs. Since an enterprise typically includes multiple systems, different exercise time periods need to be set for different systems. However, when a plurality of systems perform disaster recovery switching exercise, data loss or system failure of some systems may be caused.
Disclosure of Invention
The application provides a system access switching method and a system access switching device, which are used for solving the problem that when a plurality of systems perform disaster recovery switching exercise, data of some systems are possibly lost or the system is possibly failed.
In a first aspect, the present application provides a system access switching method, including: receiving a plurality of disaster recovery drilling plan documents from a first terminal, wherein each disaster recovery drilling plan document at least comprises an identification of a system to be drilled, a drilling time period and an identification of a system mutually exclusive with the identification of the system to be drilled; when the fact that the exercise time periods of any two disaster recovery exercise plan documents are overlapped is detected, and the identification of the system to be exercised of one disaster recovery exercise plan document is the identification of the system mutually exclusive to the identification of the system to be exercised in the other disaster recovery exercise plan document, updating the exercise time period of one disaster recovery exercise plan document so that the exercise time periods of the two disaster recovery exercise plan documents are not overlapped; when the current moment reaches any drilling time period, the access address of the system to be drilled in the corresponding disaster recovery drilling plan document is switched from the first access address to the second access address, so that the second terminal accesses the system to be drilled through the second access address.
The application provides a system access switching method, wherein when a server detects that the exercise time periods of any two disaster recovery exercise plan documents are overlapped, and the identification of a system to be exercised of one disaster recovery exercise plan document is the identification of a system mutually exclusive to the identification of the system to be exercised in the other disaster recovery exercise plan document, the server indicates that if the two systems are simultaneously exercised in disaster recovery switching, data loss or system faults can be caused. In this way, the server updates the exercise period of one of the disaster recovery exercise program documents so that there is no overlap of the exercise periods of the two disaster recovery exercise program documents. Therefore, disaster recovery switching exercise is carried out on the two systems in different time periods, and data loss or system faults are avoided.
In one possible implementation, each disaster recovery drilling plan document further includes a creation time, and updating drilling time periods of one of the disaster recovery drilling plan documents so that there is no overlap of drilling time periods of the two disaster recovery drilling plan documents, including: the exercise time periods of the disaster recovery exercise plan documents with later creation time are delayed so that there is no overlap of the exercise time periods of the two disaster recovery exercise plan documents.
Generally, the earlier the disaster recovery exercise plan document is created, the earlier the user may want to switch the system to be exercised corresponding to the disaster recovery exercise plan document, so that the exercise time period of the disaster recovery exercise plan document with the later creation time is delayed, and the requirement of the user can be met while avoiding data loss or system failure.
In one possible embodiment, after receiving a plurality of disaster recovery drilling plan documents from the terminal, the method provided by the present application further includes: if the drilling time period of any disaster recovery drilling plan document is detected to be overlapped with the preset first target time period which does not allow the access address of the system to be switched, the drilling time period of the disaster recovery drilling plan document is delayed to be in the next second target time period which allows the access address of the system to be switched. Therefore, when the system to be exercised corresponding to the disaster recovery exercise plan document is switched in the first target time period, the situation that data are lost or the system fails and simultaneously the requirement of a user is met can be avoided.
In one possible implementation manner, each disaster recovery drilling plan document further includes a drilling cycle of a system to be drilled, and after delaying the drilling time period of the disaster recovery drilling plan document to a second target time period for allowing switching of access addresses of the system, the method provided by the application further includes: when the delayed exercise time period of the disaster recovery exercise plan document is detected to be overlapped with the exercise time period in the other disaster recovery exercise plan document, and the identification of the system to be exercised of the disaster recovery exercise plan document is the identification of the system mutually exclusive to the identification of the system to be exercised in the other disaster recovery exercise plan document, the exercise time period of the other disaster recovery exercise plan document is delayed to be in a second target time period for allowing the access address of the system to be switched.
Because the exercise time period of the disaster recovery exercise plan document is delayed once, when the exercise waiting system corresponding to the disaster recovery exercise plan document is detected to be mutually exclusive with the exercise waiting system corresponding to the other disaster recovery exercise plan document, the exercise time period of the other disaster recovery exercise plan document is delayed until the next second target time period for allowing the access address of the system to be switched, and therefore the requirement that a user switches the exercise waiting system corresponding to the disaster recovery exercise plan document earlier can be met.
In a possible implementation manner, each disaster recovery drilling plan document further includes a drilling scene type, where the drilling scene type corresponds to a degree of influence of access to a system to be drilled after an access address of the system to be drilled is switched, and the method provided by the present application further includes: and when the current moment reaches any exercise time period, sending a notification message to a third terminal associated with the corresponding exercise scene type, wherein the notification message is used for indicating that the access of a system to be exercised is influenced in the exercise time period.
In this way, the user can perceive, through the third terminal, whether there is an influence on the access of the system to be exercised in the exercise period.
In one possible embodiment, the method provided by the application further comprises: and when the influence degree corresponding to the exercise scene type is larger than the set threshold value and the exercise time period is in the working day, delaying the exercise time period to the non-working day.
The exercise time period corresponding to the disaster recovery exercise plan document is delayed to be within a non-working day, so that the situation that data are lost or a system fails and simultaneously the requirement of a user is met when a system to be exercised corresponding to the disaster recovery exercise plan document is switched and exercised can be further avoided.
In one possible embodiment, the method provided by the application further comprises: receiving a login request from a first terminal, wherein the login request carries a user account; when the type of the user account is an administrator account, sending implementation progress data of a plurality of disaster recovery drilling plan documents to a first terminal; and when the type of the user account is a department user account, sending implementation progress data of the disaster recovery drilling plan document associated with the department user account in the plurality of disaster recovery drilling plan documents to the first terminal.
In a second aspect, the present application further provides a system access switching device, including: and the data receiving unit is used for receiving a plurality of disaster recovery drilling plan documents from the first terminal, and each disaster recovery drilling plan document at least comprises an identification of a system to be drilled, a drilling time period and an identification of a system mutually exclusive to the identification of the system to be drilled. And the data updating unit is used for updating the exercise time periods of one disaster recovery exercise plan document when the exercise time periods of any two disaster recovery exercise plan documents are detected to be overlapped, and the identification of the system to be exercised of one disaster recovery exercise plan document is the identification of the system mutually exclusive to the identification of the system to be exercised in the other disaster recovery exercise plan document, so that the exercise time periods of the two disaster recovery exercise plan documents are not overlapped. And the data access unit is used for switching the access address of the system to be exercised in the corresponding disaster recovery exercise plan document from the first access address to the second access address when any exercise time period is reached at the current moment, so that the second terminal accesses the system to be exercised through the second access address.
In a third aspect, the application also provides a computer-readable storage medium storing a computer program which, when executed by a processor, causes the computer to perform the method as provided in the first aspect.
In a fourth aspect, the application also provides a server comprising a memory, a processor and a computer program stored in the memory and executable on the processor, when executing the computer program, causing the server to perform the method as provided in the first aspect.
In a fifth aspect, the application also provides a computer program product comprising a computer program which, when run, causes a computer to perform the method as provided in the first aspect.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions of the prior art, the drawings that are needed in the embodiments or the description of the prior art will be briefly described below, it will be obvious that the drawings in the following description are some embodiments of the present application, and that other drawings can be obtained according to these drawings without inventive effort to a person skilled in the art.
FIG. 1 is a flowchart of a system access switching method according to an embodiment of the present application;
fig. 2 is an interaction schematic diagram before a first server according to an embodiment of the present application performs system access switching;
fig. 3 is an interaction schematic diagram of a first server according to an embodiment of the present application after system access switching;
fig. 4 is a flowchart of a system access switching device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more apparent, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments of the present application. All other embodiments, which are made by a person skilled in the art based on the embodiments of the application in light of the present disclosure, are intended to be within the scope of the application.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above drawings, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Generally, some enterprises (such as banks and fund companies) perform disaster recovery switching exercises in order to perform disaster recovery switching normally when unexpected occurs. Since an enterprise typically includes multiple systems, different exercise time periods need to be set for different systems. However, when a plurality of systems perform disaster recovery switching exercise, data loss or system failure of some systems may be caused.
Based on the technical problems, the application concept of the application is as follows: two disaster recovery drilling plans corresponding to mutually exclusive drilling systems to be drilled can be detected, and drilling time periods of the two disaster recovery drilling plans are set to be non-overlapping. Therefore, disaster recovery switching exercise is performed on the two mutually exclusive systems to be exercised in different time periods, and data loss or system faults are avoided.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Referring to fig. 1, the present application provides a system access switching method, which is applied to a first server 100. As shown in fig. 2, the first server 100 is communicatively connected to a first terminal 400, where the first terminal 400 may be a computer of a worker (e.g., a background worker of a bank or a financial company). Specifically, the system access switching method includes:
s101: the first server 100 receives a plurality of disaster recovery drilling plan documents from the first terminal 400, each including at least an identification of a system to be drilled, a drilling time period, and an identification of a system mutually exclusive to the identification of the system to be drilled.
It should be noted that, a system mutually exclusive to a system to be exercised means: when the system to be exercised and the mutually exclusive system run simultaneously, the two systems can mutually influence each other, and data loss or system failure of any party can be caused.
The worker may set a plurality of disaster recovery exercise plan documents at the first terminal 400. For example, the set disaster recovery drilling plan document A comprises an identification of the system A, a drilling time period A and an identification of the system B which is mutually exclusive with the identification of the system A to be drilled; the set disaster recovery drilling plan document B comprises a marking of a system B to be drilled, a drilling time period B and a marking of a system A mutually exclusive with the marking of the system B, wherein the drilling time period B and the drilling time period A are overlapped; the set disaster recovery drilling plan document C comprises an identification of a system C to be drilled and a drilling time period C.
It should be noted that, the staff may set a plurality of disaster recovery exercise plan documents in a form filling manner on the interface of the first terminal 400, or may set a plurality of disaster recovery exercise plan documents in a form of a plurality of attachments on the interface of the first terminal 400, which is not limited herein.
S102: when the first server 100 detects that the exercise time periods of any two disaster recovery exercise program documents overlap, and the identification of the system to be exercised of one disaster recovery exercise program document is the identification of the system to be exercised exclusive of the identification of the system to be exercised in the other disaster recovery exercise program document, the exercise time period of one disaster recovery exercise program document is updated so that the exercise time periods of the two disaster recovery exercise program documents do not overlap.
On the basis of the embodiment corresponding to S101, when the first server 100 detects that there is an overlap between the exercise time period a in the disaster recovery exercise plan document a and the exercise time period B in the disaster recovery exercise plan document B, and the system a to be exercised is mutually exclusive to the system B to be exercised, the exercise time period B in the disaster recovery exercise plan document B is updated (for example, the exercise time period B is deferred from 14:00-16:00 of the current Saturday to 14:00-16:00 of the next Saturday) so that there is no overlap between the disaster recovery exercise plan document a and the disaster recovery exercise plan document B.
Further, each disaster recovery drilling plan document further includes a creation time, and drilling time periods of the disaster recovery drilling plan documents with a later creation time are delayed so that there is no overlap of drilling time periods of the two disaster recovery drilling plan documents. For example, the creation time of the disaster recovery drilling plan document a is earlier than the creation time of the disaster recovery drilling plan document B. At this time, the exercise period of the disaster recovery exercise plan document B is delayed so that there is no overlap of the exercise periods of the disaster recovery exercise plan document a and the disaster recovery exercise plan document B.
Generally, the earlier the disaster recovery exercise plan document is created, the earlier the user may want to switch the system to be exercised corresponding to the disaster recovery exercise plan document, so that the exercise time period of the disaster recovery exercise plan document with the later creation time is delayed, and the requirement of the user can be met while avoiding data loss or system failure.
Further, each disaster recovery drilling plan document also includes drilling cycles of the system to be drilled. For example, when the system to be exercised included in the disaster recovery exercise plan is a dual-activity architecture system, the exercise cycle is to develop disaster recovery exercise once every three months, and when the system to be exercised included in the disaster recovery exercise plan is a database system, the disaster recovery exercise is developed once every six months; when the system to be exercised contained in the disaster recovery exercise plan is a specified important information system, disaster recovery exercise is carried out every three years.
Based on the above embodiment, when the delayed exercise period of the disaster recovery exercise plan document is detected to overlap with the exercise period of the other disaster recovery exercise plan document, and the identification of the system to be exercised of the disaster recovery exercise plan document is the identification of the system mutually exclusive to the identification of the system to be exercised of the other disaster recovery exercise plan document, the exercise period of the other disaster recovery exercise plan document is delayed to be within the second target period of the next permission to switch the access address of the system.
For example, if the exercise period corresponding to the delayed disaster recovery exercise program document B is 3 months, when the exercise period of the disaster recovery exercise program document B exceeds 3 months from the last exercise period and overlaps with the exercise period in another disaster recovery exercise program document and mutual exclusion exists between the systems to be exercised, the disaster recovery exercise system B corresponding to the disaster recovery exercise program document B is preferentially exercised in the delayed exercise period, and the exercise period of the other disaster recovery exercise program document is delayed until the next second target period allowing the access address of the system to be switched. The second target period may be a period of time within a non-working day (e.g., weekend), or may be a period of time within a non-working day (e.g., 18:00-24:00).
It can be understood that, since the exercise time period of the disaster recovery exercise plan document is delayed once, when the exercise waiting system corresponding to the disaster recovery exercise plan document is detected to be mutually exclusive with the exercise waiting system corresponding to another disaster recovery exercise plan document, the exercise time period of the other disaster recovery exercise plan document is delayed to the next second target time period for allowing the access address of the system to be switched, so that the requirement that the user switches the exercise waiting system corresponding to the disaster recovery exercise plan document earlier can be met.
S103: when the first server 100 reaches any exercise time period at the current moment, the access address of the system to be exercised in the corresponding disaster recovery exercise plan document is switched from the first access address to the second access address, so that the second terminal accesses the system to be exercised through the second access address.
Illustratively, a target application (e.g., a mobile banking, financial application) is running on the second terminal, the target application including a plurality of target controls, such as transfer controls, deposit controls, withdrawal controls, and the like. Initially, as shown in fig. 2, when the transfer control is triggered, the first terminal 400 may access the transfer system located in the second server 200 of the place a through the first access address; when the withdrawal control is triggered, the first terminal 400 may access the withdrawal system located in the second server 200 of the a-site through the first access address; when the deposit control is triggered, the first terminal 400 may access the deposit system located in the second server 200 of the a-site through the first access address.
When the access address of the system to be exercised is switched from the first access address to the second access address, as shown in fig. 3, when the transfer control is triggered, the first terminal 400 may access the transfer system located in the third server 300 of the B-site through the second access address; when the withdrawal control is triggered, the first terminal 400 may access the withdrawal system located in the third server 300 of the B-site through the second access address; when the deposit control is triggered, the first terminal 400 may access the deposit system located in the third server 300 of the B-site through the second access address.
Note that S103 may be implemented not only by the first server 100 but also by another server, and is not limited thereto.
In summary, the present application provides a system access switching method, where when a server detects that there is an overlap between drilling periods of any two disaster recovery drilling plan documents, and an identifier of a system to be drilled of one disaster recovery drilling plan document is an identifier of a system mutually exclusive to an identifier of a system to be drilled in another disaster recovery drilling plan document, it is described that if disaster recovery switching drilling is performed on both systems at the same time, data loss or system failure may be caused. In this way, the server updates the exercise period of one of the disaster recovery exercise program documents so that there is no overlap of the exercise periods of the two disaster recovery exercise program documents. Therefore, disaster recovery switching exercise is carried out on the two systems to be exercised in different time periods, and data loss or system faults are avoided.
In one possible embodiment, after S101, the method provided by the present application further includes: if the drilling time period of any disaster recovery drilling plan document is detected to be overlapped with the preset first target time period which does not allow the access address of the system to be switched, the drilling time period of the disaster recovery drilling plan document is delayed to be in the next second target time period which allows the access address of the system to be switched.
The preset first target period of time when the access address of the system is not allowed to be switched can be a holiday period such as a national day period and a spring day period, and a transaction peak period such as 618 and twenty-one. And delaying the drilling time period of the disaster recovery drilling plan document to the next second target time period for allowing the access address of the system to be switched, so that the situation that the data is lost or the system fails and simultaneously the requirement of a user is met when the system to be drilled corresponding to the disaster recovery drilling plan document is switched in the first target time period can be avoided. For example, if the exercise period of the disaster recovery exercise program document is in the national day period, the exercise period of the disaster recovery exercise program document is delayed to the first Saturday after the national day period.
In one possible implementation manner, each disaster recovery drilling plan document further includes drilling scene types, and the drilling scene types correspond to the influence degree of the access of the system to be drilled after the access address of the system to be drilled is switched. Illustratively, the drilling scene type may include a drilling scene type 1-true handover with a large business impact; the type 2 of the drilling scene is truly switched and has smaller business influence; drill scene type 2—true switch during non-working period and no business impact.
The method provided by the application can further comprise the following steps: and when the current moment reaches any exercise time period, sending a notification message to a third terminal associated with the corresponding exercise scene type, wherein the notification message is used for indicating that the access of a system to be exercised is influenced in the exercise time period. For example, when the exercise scene type is an exercise scene type 1-true switch and has a large business impact, the first server 100 needs to upload materials reported to the third terminal of the supervision department such as the people bank, the Unionpay or the Internet, and send a notification notice to the third terminal facing the client and the third terminal of the staff of the bank, where the notification notice is used to indicate that there is a large business impact in performing the system switch in the exercise period. When the exercise scene type is the exercise scene type 2-true switching and has smaller business influence, the first server 100 needs the third terminal of the client to upload and the third terminal of the staff of the bank to send a notification notice, and the notification notice is used for indicating that the system switching has smaller business influence in the exercise time period. When the exercise scene type is 3-real switching and no business influence exists, a notification notice is required to be uploaded to a third terminal of an in-line staff, and the notification notice is used for indicating that the system switching does not have business influence in the exercise time period. In this way, the user can perceive, through the third terminal, whether there is an influence on the access of the system to be exercised in the exercise period.
In one possible embodiment, the method provided by the application further comprises: and when the influence degree corresponding to the exercise scene type is larger than the set threshold value and the exercise time period is in the working day, delaying the exercise time period to the non-working day. Therefore, the exercise time period corresponding to the disaster recovery exercise plan document is delayed to be within a non-working day, and the situation that data are lost or the system fails and simultaneously the requirement of a user is met when the system to be exercised corresponding to the disaster recovery exercise plan document is switched and exercised can be further avoided.
In a possible implementation manner, the method provided by the embodiment of the application further comprises the following steps: receiving a login request from a first terminal 400, wherein the login request carries a user account; when the type of the user account is an administrator account, sending implementation progress data of a plurality of disaster recovery drilling plan documents to the first terminal 400; and when the type of the user account is a department user account, sending implementation progress data of the disaster recovery drilling plan document associated with the department user account from among the plurality of disaster recovery drilling plan documents to the first terminal 400.
Referring to fig. 4, the present application further provides a system access switching device, which includes a data receiving unit 401, a data updating unit 402, and a data accessing unit 403, wherein,
the data receiving unit 401 is configured to receive a plurality of disaster recovery drilling plan documents from the first terminal, where each disaster recovery drilling plan document includes at least an identification of a system to be drilled, a drilling time period, and an identification of a system mutually exclusive to the identification of the system to be drilled. The data updating unit 402 is configured to update, when it is detected that there is an overlap between the exercise time periods of any two disaster recovery exercise plan documents, and the identifier of the system to be exercised of one disaster recovery exercise plan document is the identifier of the system mutually exclusive to the identifier of the system to be exercised in the other disaster recovery exercise plan document, the exercise time period of one disaster recovery exercise plan document so that there is no overlap between the exercise time periods of the two disaster recovery exercise plan documents. And the data access unit 403 is configured to switch the access address of the system to be exercised in the corresponding disaster recovery exercise plan document from the first access address to the second access address when any exercise time period is reached at the current time, so that the second terminal accesses the system to be exercised through the second access address.
In a possible implementation manner, each disaster recovery drilling plan document further includes a creation time, and the data updating unit 402 is specifically configured to delay drilling time periods of the disaster recovery drilling plan documents with later creation times, so that the drilling time periods of the two disaster recovery drilling plan documents do not overlap.
In a possible implementation manner, the data updating unit 402 is further configured to delay, if the exercise period of any disaster recovery exercise plan document is detected and overlaps with a preset first target period in which switching of the access address of the system is not allowed, the exercise period of the disaster recovery exercise plan document to a second target period in which switching of the access address of the system is allowed next.
In a possible implementation manner, each disaster recovery drilling plan document further includes a drilling cycle of a system to be drilled, and the data updating unit 402 is further configured to, when detecting that there is an overlap between the drilling time period after the delay of the disaster recovery drilling plan document and the drilling time period in another disaster recovery drilling plan document, and the identification of the system to be drilled of the disaster recovery drilling plan document is the identification of a system mutually exclusive to the identification of the system to be drilled in another disaster recovery drilling plan document, delay the drilling time period of another disaster recovery drilling plan document to a second target time period for allowing switching of access addresses of the systems.
In one possible implementation manner, each disaster recovery drilling plan document further includes drilling scene types, and the drilling scene types correspond to the influence degree of the access of the system to be drilled after the access address of the system to be drilled is switched. The device provided by the embodiment of the application can further comprise: and the data sending unit is used for sending a notification message to a third terminal associated with the corresponding exercise scene type when the current moment reaches any exercise time period, wherein the notification message is used for indicating that the access of a system to be exercised is influenced in the exercise time period.
In a possible implementation manner, the data updating unit 402 is further configured to delay the exercise time period to be within a non-working day when the degree of influence corresponding to the exercise scene type is greater than the set threshold value and the exercise time period is within the working day.
In a possible implementation manner, the data receiving unit 401 is further configured to receive a login request from the first terminal, where the login request carries a user account. The device provided by the embodiment of the application can further comprise: the data sending unit is used for sending implementation progress data of a plurality of disaster recovery drilling plan documents to the first terminal when the type of the user account is an administrator account; and when the type of the user account is a department user account, sending implementation progress data of the disaster recovery drilling plan document associated with the department user account in the plurality of disaster recovery drilling plan documents to the first terminal.
The embodiment of the application also provides a server, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor executes the computer program to cause the server to execute the method provided in the figure 1.
In an exemplary embodiment, a non-transitory computer readable storage medium is also provided, such as a memory, comprising instructions executable by a processor to perform the above-described method. For example, the non-transitory computer readable storage medium may be ROM, random Access Memory (RAM), CD-ROM, magnetic tape, floppy disk, optical data storage device, etc. The non-transitory computer readable storage medium, when executed by a processor of a server, enables the server to perform the method of fig. 1 described above.
The embodiment of the application also provides a computer program product comprising a computer program which, when executed by a processor, performs the method of fig. 1 described above.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features can be replaced equivalently; such modifications and substitutions do not depart from the spirit of the application.

Claims (10)

1. A system access switching method, comprising:
receiving a plurality of disaster recovery drilling plan documents from a first terminal, wherein each disaster recovery drilling plan document at least comprises an identification of a system to be drilled, a drilling time period and an identification of a system mutually exclusive with the identification of the system to be drilled;
when the fact that the exercise time periods of any two disaster recovery exercise plan documents overlap is detected, and the identification of the system to be exercised of one disaster recovery exercise plan document is the identification of the system mutually exclusive to the identification of the system to be exercised in the other disaster recovery exercise plan document, updating the exercise time period of one disaster recovery exercise plan document so that the exercise time periods of the two disaster recovery exercise plan documents do not overlap;
when the current moment reaches any drilling time period, switching the access address of the corresponding system to be drilled in the disaster recovery drilling plan document from a first access address to a second access address so that a second terminal accesses the system to be drilled through the second access address.
2. The method of claim 1, wherein each disaster recovery drilling plan document further comprises a creation time, the updating drilling time periods of one of the disaster recovery drilling plan documents such that there is no overlap of drilling time periods of the two disaster recovery drilling plan documents, comprising:
and delaying the exercise time periods of the disaster recovery exercise plan documents with the later creation time so that the exercise time periods of the two disaster recovery exercise plan documents are not overlapped.
3. The method of claim 1, wherein after the receiving the plurality of disaster recovery drilling plan documents from the terminal, the method further comprises:
if the drilling time period of any disaster recovery drilling plan document is detected to be overlapped with the preset first target time period which does not allow the access address of the system to be switched, the drilling time period of the disaster recovery drilling plan document is delayed to be in the next second target time period which allows the access address of the system to be switched.
4. The method of claim 3, wherein each disaster recovery exercise plan document further includes an exercise cycle of the system to be exercised, and wherein after the delaying the exercise period of the disaster recovery exercise plan document to the next target period in which switching of access addresses of the system is allowed, the method further comprises:
and when the delayed exercise time period of the disaster recovery exercise plan document is detected to be overlapped with the exercise time period in another disaster recovery exercise plan document, and the identification of the system to be exercised of the disaster recovery exercise plan document is the identification of the mutually exclusive system to be exercised in the other disaster recovery exercise plan document, delaying the exercise time period of the other disaster recovery exercise plan document to be in a second target time period for allowing switching of the access address of the system.
5. The method of claim 1, wherein each disaster recovery drilling plan document further includes a drilling scene type corresponding to a degree of influence of access to a system to be drilled after an access address of the system to be drilled is switched, the method further comprising:
and when the current moment reaches any exercise time period, sending a notification message to a third terminal associated with the corresponding exercise scene type, wherein the notification message is used for indicating that the access of a system to be exercised is influenced in the exercise time period.
6. The method of claim 5, wherein the method further comprises: and when the influence degree corresponding to the exercise scene type is larger than a set threshold value and the exercise time period is in a working day, delaying the exercise time period to a non-working day.
7. The method according to claim 1, wherein the method further comprises:
receiving a login request from the first terminal, wherein the login request carries a user account;
when the type of the user account is an administrator account, sending implementation progress data of the disaster recovery drilling plan documents to the first terminal;
and when the type of the user account is a department user account, sending implementation progress data of the disaster recovery drilling plan document associated with the department user account in the plurality of disaster recovery drilling plan documents to the first terminal.
8. A system access switching device, comprising:
the system comprises a data receiving unit, a first terminal and a second terminal, wherein the data receiving unit is used for receiving a plurality of disaster recovery drilling plan documents from the first terminal, and each disaster recovery drilling plan document at least comprises an identification of a system to be drilled, a drilling time period and an identification of a system mutually exclusive to the identification of the system to be drilled;
a data updating unit, configured to update, when it is detected that there is an overlap between the exercise time periods of any two disaster recovery exercise plan documents, and the identifier of the system to be exercised of one disaster recovery exercise plan document is the identifier of the system mutually exclusive to the identifier of the system to be exercised in the other disaster recovery exercise plan document, the exercise time period of one disaster recovery exercise plan document so that there is no overlap between the exercise time periods of the two disaster recovery exercise plan documents;
and the data access unit is used for switching the access address of the system to be exercised in the corresponding disaster recovery exercise plan document from the first access address to the second access address when any exercise time period is reached at the current moment, so that the second terminal accesses the system to be exercised through the second access address.
9. A server comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor, when executing the computer program, causes the server to perform the method according to any one of claims 1 to 7.
10. A computer readable storage medium storing a computer program, which when executed by a processor causes a computer to perform the method of any one of claims 1 to 7.
CN202211109709.6A 2022-09-13 2022-09-13 System access switching method and device Active CN115396327B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211109709.6A CN115396327B (en) 2022-09-13 2022-09-13 System access switching method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211109709.6A CN115396327B (en) 2022-09-13 2022-09-13 System access switching method and device

Publications (2)

Publication Number Publication Date
CN115396327A CN115396327A (en) 2022-11-25
CN115396327B true CN115396327B (en) 2023-11-21

Family

ID=84126810

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211109709.6A Active CN115396327B (en) 2022-09-13 2022-09-13 System access switching method and device

Country Status (1)

Country Link
CN (1) CN115396327B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254100A (en) * 2016-07-27 2016-12-21 腾讯科技(深圳)有限公司 A kind of data disaster tolerance methods, devices and systems
CN112153134A (en) * 2020-09-18 2020-12-29 北京浪潮数据技术有限公司 Disaster tolerance drilling method, device, equipment and storage medium of disaster tolerance cloud host

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7962458B2 (en) * 2008-06-12 2011-06-14 Gravic, Inc. Method for replicating explicit locks in a data replication engine

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254100A (en) * 2016-07-27 2016-12-21 腾讯科技(深圳)有限公司 A kind of data disaster tolerance methods, devices and systems
CN112153134A (en) * 2020-09-18 2020-12-29 北京浪潮数据技术有限公司 Disaster tolerance drilling method, device, equipment and storage medium of disaster tolerance cloud host

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"大型ERP系统中灾难备份机制的研究与构建";闵捷;《中国优秀硕士学位论文全文数据库信息科技辑》;I138-76 *

Also Published As

Publication number Publication date
CN115396327A (en) 2022-11-25

Similar Documents

Publication Publication Date Title
CN109901949B (en) Application disaster recovery system and method for double-activity data center
CA3028504C (en) Data processing method and device
CN106487486B (en) Service processing method and data center system
Alhazmi et al. Assessing disaster recovery alternatives: On-site, colocation or cloud
US10169139B2 (en) Using predictive analytics of natural disaster to cost and proactively invoke high-availability preparedness functions in a computing environment
CN109308252A (en) A kind of fault location processing method and processing device
CN111698315B (en) Data processing method and device for block and computer equipment
CN111143023B (en) Resource changing method and device, equipment and storage medium
CN106850315B (en) Automatic disaster recovery system
JP6097105B2 (en) Information processing apparatus and worker assignment method
CN111158962A (en) Remote disaster recovery method, device, system, electronic equipment and storage medium
EP4060514A1 (en) Distributed database system and data disaster backup drilling method
CN105988894A (en) Disaster tolerance technique of active-active mode
CN106056436B (en) Data rollback method, device and system
CN111311254A (en) Service processing method, device and system based on block chain
CN116366652A (en) Distributed application operation and maintenance method, system, device, server and gateway equipment
CN107196777A (en) A kind of method and apparatus of application processing
CN108984334B (en) Method and apparatus for managing sessions
CN115396327B (en) System access switching method and device
CN112667651A (en) Data communication method and device
CN107291575B (en) Processing method and equipment for data center fault
CN110471906B (en) Database switching method, device and equipment
CN114546705B (en) Operation response method, operation response device, electronic apparatus, and storage medium
CN104407806A (en) Method and device for revising hard disk information of redundant array group of independent disk (RAID)
CN104021033A (en) Method and system for hashing busy processing nodes

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant